
















| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/181,320US7784098B1 (en) | 2005-07-14 | 2005-07-14 | Snapshot and restore technique for computer system recovery |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/181,320US7784098B1 (en) | 2005-07-14 | 2005-07-14 | Snapshot and restore technique for computer system recovery |
| Publication Number | Publication Date |
|---|---|
| US7784098B1true US7784098B1 (en) | 2010-08-24 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/181,320Active2029-05-17US7784098B1 (en) | 2005-07-14 | 2005-07-14 | Snapshot and restore technique for computer system recovery |
| Country | Link |
|---|---|
| US (1) | US7784098B1 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080016564A1 (en)* | 2005-08-16 | 2008-01-17 | Emc Corporation | Information protection method and system |
| US20080047013A1 (en)* | 2005-08-16 | 2008-02-21 | Emc Corporation | Method and system for detecting malware |
| US20080276299A1 (en)* | 2007-04-02 | 2008-11-06 | Samsung Electronics Co., Ltd. | Wireless terminal apparatus and method of protecting system resources |
| US20090038012A1 (en)* | 2007-08-03 | 2009-02-05 | Lenovo (Beijing) Limited | Method and system for deleting or isolating computer viruses |
| US20100115334A1 (en)* | 2008-11-05 | 2010-05-06 | Mark Allen Malleck | Lightweight application-level runtime state save-and-restore utility |
| US7934262B1 (en)* | 2007-12-26 | 2011-04-26 | Emc (Benelux) B.V., S.A.R.L. | Methods and apparatus for virus detection using journal data |
| US20110099632A1 (en)* | 2005-07-15 | 2011-04-28 | Microsoft Corporation | Detecting user-mode rootkits |
| US20110197279A1 (en)* | 2009-05-29 | 2011-08-11 | Hitachi, Ltd. | Management methods of storage system and file system |
| US20110296237A1 (en)* | 2010-05-26 | 2011-12-01 | International Business Machines Corporation | Selecting a data restore point with an optimal recovery time and recovery point |
| US20120143826A1 (en)* | 2007-12-19 | 2012-06-07 | Microsoft Corporation | Creating and utilizing network restore points |
| US20120158661A1 (en)* | 2010-12-15 | 2012-06-21 | Microsoft Corporation | Context-specific rollback |
| US20120297488A1 (en)* | 2011-05-16 | 2012-11-22 | Microsoft Corporation | Discovering Malicious Input Files and Performing Automatic and Distributed Remediation |
| US20120322439A1 (en)* | 2010-06-14 | 2012-12-20 | Future Dial Inc. | System and Method for Enhanced Diagnostics on Mobile Communication Devices |
| US8352522B1 (en)* | 2010-09-01 | 2013-01-08 | Trend Micro Incorporated | Detection of file modifications performed by malicious codes |
| US8392539B1 (en)* | 2008-03-19 | 2013-03-05 | Trend Micro, Inc. | Operating system banking and portability |
| US8418251B1 (en)* | 2009-04-27 | 2013-04-09 | Symantec Corporation | Detecting malware using cost characteristics |
| CN103065091A (en)* | 2011-12-22 | 2013-04-24 | 微软公司 | Extension of system restoration by using malware detection |
| US20130160131A1 (en)* | 2011-12-20 | 2013-06-20 | Matias Madou | Application security testing |
| WO2013087603A1 (en)* | 2011-12-14 | 2013-06-20 | F-Secure Corporation | Disinfection of a file system |
| US8683576B1 (en)* | 2009-09-30 | 2014-03-25 | Symantec Corporation | Systems and methods for detecting a process to establish a backdoor connection with a computing device |
| US20140122859A1 (en)* | 2012-11-01 | 2014-05-01 | International Business Machines Corporation | Configuring configuration settings using a user context |
| WO2014209825A1 (en)* | 2013-06-25 | 2014-12-31 | Microsoft Corporation | Reverse replication to rollback corrupted files |
| US8949187B1 (en)* | 2008-05-30 | 2015-02-03 | Symantec Corporation | Systems and methods for creating and managing backups based on health information |
| US8996916B2 (en) | 2011-08-16 | 2015-03-31 | Future Dial, Inc. | System and method for identifying problems via a monitoring application that repetitively records multiple separate consecutive files listing launched or installed applications |
| US9323924B1 (en)* | 2014-05-09 | 2016-04-26 | Symantec Corporation | Systems and methods for establishing reputations of files |
| US9378096B1 (en)* | 2012-06-30 | 2016-06-28 | Emc Corporation | System and method for cache management |
| EP2972772A4 (en)* | 2013-03-15 | 2016-11-16 | Amazon Tech Inc | INSTANT COPIES IN PLACE |
| US9734337B1 (en)* | 2017-01-24 | 2017-08-15 | Malwarebytes Inc. | Behavior-based ransomware detection |
| US9773026B1 (en)* | 2012-12-20 | 2017-09-26 | EMC IP Holding Company LLC | Calculation of system utilization |
| US20180167403A1 (en)* | 2016-12-12 | 2018-06-14 | Ut Battelle, Llc | Malware analysis and recovery |
| US10043026B1 (en)* | 2015-11-09 | 2018-08-07 | 8X8, Inc. | Restricted replication for protection of replicated databases |
| US10326599B2 (en) | 2016-05-09 | 2019-06-18 | Hewlett Packard Enterprise Development Lp | Recovery agents and recovery plans over networks |
| WO2019190936A1 (en)* | 2018-03-30 | 2019-10-03 | Microsoft Technology Licensing, Llc | Selection of restore point based on detection of malware attack |
| US20190306179A1 (en)* | 2018-03-30 | 2019-10-03 | Microsoft Technology Licensing, Llc | Service identification of ransomware impacted files |
| US10440039B1 (en) | 2015-11-09 | 2019-10-08 | 8X8, Inc. | Delayed replication for protection of replicated databases |
| US10769278B2 (en) | 2018-03-30 | 2020-09-08 | Microsoft Technology Licensing, Llc | Service identification of ransomware impact at account level |
| US10885196B2 (en) | 2016-04-29 | 2021-01-05 | Hewlett Packard Enterprise Development Lp | Executing protected code |
| US10896085B2 (en) | 2018-05-08 | 2021-01-19 | Hewlett-Packard Development Company, L.P. | Mitigating actions |
| US11010470B2 (en)* | 2017-12-15 | 2021-05-18 | Microsoft Technology Licensing, Llc | Anti-virus file system cache for operating system remediation |
| US11153373B2 (en) | 2019-05-03 | 2021-10-19 | EMC IP Holding Company LLC | Method and system for performance-driven load shifting |
| US20220058103A1 (en)* | 2020-08-19 | 2022-02-24 | Unitedhealth Group Incorporated | Dynamic post-change computing-system evaluation |
| CN114116322A (en)* | 2022-01-27 | 2022-03-01 | 深圳市科力锐科技有限公司 | Data recovery method, device, equipment and storage medium |
| US11275834B1 (en)* | 2017-01-12 | 2022-03-15 | Richard Offer | System for analyzing backups for threats and irregularities |
| US11308207B2 (en) | 2018-03-30 | 2022-04-19 | Microsoft Technology Licensing, Llc | User verification of malware impacted files |
| US11809559B2 (en) | 2018-08-03 | 2023-11-07 | Hewlett-Packard Development Company, L.P. | Intrusion resilient applications |
| US20230388340A1 (en)* | 2022-05-31 | 2023-11-30 | WithSecure Corporation | Arrangement and method of threat detection in a computer or computer network |
| US12131294B2 (en) | 2012-06-21 | 2024-10-29 | Open Text Corporation | Activity stream based interaction |
| US12149623B2 (en) | 2018-02-23 | 2024-11-19 | Open Text Inc. | Security privilege escalation exploit detection and mitigation |
| US12164466B2 (en) | 2010-03-29 | 2024-12-10 | Open Text Inc. | Log file management |
| US12197383B2 (en) | 2015-06-30 | 2025-01-14 | Open Text Corporation | Method and system for using dynamic content types |
| US12235960B2 (en) | 2019-03-27 | 2025-02-25 | Open Text Inc. | Behavioral threat detection definition and compilation |
| US12261822B2 (en) | 2014-06-22 | 2025-03-25 | Open Text Inc. | Network threat prediction and blocking |
| US12282549B2 (en) | 2005-06-30 | 2025-04-22 | Open Text Inc. | Methods and apparatus for malware threat research |
| US12412413B2 (en) | 2015-05-08 | 2025-09-09 | Open Text Corporation | Image box filtering for optical character recognition |
| US12437068B2 (en) | 2015-05-12 | 2025-10-07 | Open Text Inc. | Automatic threat detection of executable files based on static data analysis |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5381545A (en)* | 1991-06-04 | 1995-01-10 | International Business Machines Corporation | Data backup and recovery in a data processing system |
| US6067410A (en)* | 1996-02-09 | 2000-05-23 | Symantec Corporation | Emulation repair system |
| US6128630A (en)* | 1997-12-18 | 2000-10-03 | International Business Machines Corporation | Journal space release for log-structured storage systems |
| US6161130A (en) | 1998-06-23 | 2000-12-12 | Microsoft Corporation | Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set |
| US20020178374A1 (en)* | 2001-05-25 | 2002-11-28 | International Business Machines Corporation | Method and apparatus for repairing damage to a computer system using a system rollback mechanism |
| US20030023733A1 (en)* | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Apparatus and method for using a network processor to guard against a "denial-of-service" attack on a server or server cluster |
| US20030187853A1 (en)* | 2002-01-24 | 2003-10-02 | Hensley Roy Austin | Distributed data storage system and method |
| US20030191782A1 (en)* | 2002-04-09 | 2003-10-09 | International Business Machines Corporation | Data recovery system |
| US20030208500A1 (en)* | 2002-02-15 | 2003-11-06 | Daynes Laurent P. | Multi-level undo of main-memory and volatile resources |
| US20040034813A1 (en)* | 2002-02-22 | 2004-02-19 | Francois-Xavier Chaboud | Validation device |
| US20040111557A1 (en)* | 2002-12-04 | 2004-06-10 | Yoji Nakatani | Updated data write method using journal log |
| US20040199827A1 (en) | 2003-04-01 | 2004-10-07 | Muttik Igor Garrievich | Malware detection uswing external core characteristics |
| US20050060528A1 (en)* | 2003-09-17 | 2005-03-17 | Samsung Electronics Co., Ltd. | Booting and boot code update method and system thereof |
| US20050060699A1 (en)* | 2003-09-17 | 2005-03-17 | Samsung Electronics Co., Ltd. | Method and system for updating software |
| US6877109B2 (en)* | 2001-11-19 | 2005-04-05 | Lsi Logic Corporation | Method for the acceleration and simplification of file system logging techniques using storage device snapshots |
| US20050216759A1 (en) | 2004-03-29 | 2005-09-29 | Rothman Michael A | Virus scanning of input/output traffic of a computer system |
| US6973577B1 (en) | 2000-05-26 | 2005-12-06 | Mcafee, Inc. | System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state |
| US20060041942A1 (en) | 2004-06-24 | 2006-02-23 | Mcafee, Inc. | System, method and computer program product for preventing spyware/malware from installing a registry |
| US20060047931A1 (en)* | 2004-08-27 | 2006-03-02 | Nobuyuki Saika | Method and program for creating a snapshot, and storage system |
| US7039830B2 (en)* | 2000-12-14 | 2006-05-02 | Far Stone Technology Corporation | Backup/recovery system and methods for protecting a computer system |
| US20060137010A1 (en)* | 2004-12-21 | 2006-06-22 | Microsoft Corporation | Method and system for a self-healing device |
| US20060136720A1 (en)* | 2004-12-21 | 2006-06-22 | Microsoft Corporation | Computer security management, such as in a virtual machine or hardened operating system |
| US20060136771A1 (en)* | 2004-12-06 | 2006-06-22 | Hitachi, Ltd. | Storage system and snapshot data preparation method in storage system |
| US20060173935A1 (en)* | 2005-02-03 | 2006-08-03 | Arif Merchant | Method of restoring data |
| US7103913B2 (en) | 2002-05-08 | 2006-09-05 | International Business Machines Corporation | Method and apparatus for determination of the non-replicative behavior of a malicious program |
| US20060236049A1 (en)* | 2005-04-13 | 2006-10-19 | Hitachi, Ltd. | Remote copy system and remote copy method |
| US20070006304A1 (en)* | 2005-06-30 | 2007-01-04 | Microsoft Corporation | Optimizing malware recovery |
| US7188369B2 (en) | 2002-10-03 | 2007-03-06 | Trend Micro, Inc. | System and method having an antivirus virtual scanning processor with plug-in functionalities |
| US20070088970A1 (en)* | 2003-04-10 | 2007-04-19 | Lenovo (Singapore) Pte.Ltd | Recovery from failures within data processing systems |
| US7376970B2 (en) | 2004-02-20 | 2008-05-20 | Microsoft Corporation | System and method for proactive computer virus protection |
| US7409791B2 (en) | 2003-12-02 | 2008-08-12 | Grip Pod Systems, L.L.C. | Vertical fore grip with bipod |
| US7565382B1 (en)* | 2003-08-14 | 2009-07-21 | Symantec Corporation | Safely rolling back a computer image |
| US7581136B2 (en)* | 2006-05-19 | 2009-08-25 | Hitachi, Ltd. | Method and apparatus for data recovery |
| US7587760B1 (en)* | 2004-07-26 | 2009-09-08 | Cisco Technology, Inc. | System and methods for preventing denial of service attacks |
| US7636946B2 (en)* | 2005-08-31 | 2009-12-22 | Microsoft Corporation | Unwanted file modification and transactions |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5381545A (en)* | 1991-06-04 | 1995-01-10 | International Business Machines Corporation | Data backup and recovery in a data processing system |
| US6067410A (en)* | 1996-02-09 | 2000-05-23 | Symantec Corporation | Emulation repair system |
| US6128630A (en)* | 1997-12-18 | 2000-10-03 | International Business Machines Corporation | Journal space release for log-structured storage systems |
| US6161130A (en) | 1998-06-23 | 2000-12-12 | Microsoft Corporation | Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set |
| US6973577B1 (en) | 2000-05-26 | 2005-12-06 | Mcafee, Inc. | System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state |
| US7039830B2 (en)* | 2000-12-14 | 2006-05-02 | Far Stone Technology Corporation | Backup/recovery system and methods for protecting a computer system |
| US20020178374A1 (en)* | 2001-05-25 | 2002-11-28 | International Business Machines Corporation | Method and apparatus for repairing damage to a computer system using a system rollback mechanism |
| US7188368B2 (en)* | 2001-05-25 | 2007-03-06 | Lenovo (Singapore) Pte. Ltd. | Method and apparatus for repairing damage to a computer system using a system rollback mechanism |
| US7047303B2 (en)* | 2001-07-26 | 2006-05-16 | International Business Machines Corporation | Apparatus and method for using a network processor to guard against a “denial-of-service” attack on a server or server cluster |
| US20030023733A1 (en)* | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Apparatus and method for using a network processor to guard against a "denial-of-service" attack on a server or server cluster |
| US6877109B2 (en)* | 2001-11-19 | 2005-04-05 | Lsi Logic Corporation | Method for the acceleration and simplification of file system logging techniques using storage device snapshots |
| US20030187853A1 (en)* | 2002-01-24 | 2003-10-02 | Hensley Roy Austin | Distributed data storage system and method |
| US20030208500A1 (en)* | 2002-02-15 | 2003-11-06 | Daynes Laurent P. | Multi-level undo of main-memory and volatile resources |
| US7234076B2 (en)* | 2002-02-15 | 2007-06-19 | Sun Microsystems, Inc. | Multi-level undo of main-memory and volatile resources |
| US20040034813A1 (en)* | 2002-02-22 | 2004-02-19 | Francois-Xavier Chaboud | Validation device |
| US20030191782A1 (en)* | 2002-04-09 | 2003-10-09 | International Business Machines Corporation | Data recovery system |
| US6993537B2 (en)* | 2002-04-09 | 2006-01-31 | Lenovo (Singapore) Pte. Ltd. | Data recovery system |
| US7103913B2 (en) | 2002-05-08 | 2006-09-05 | International Business Machines Corporation | Method and apparatus for determination of the non-replicative behavior of a malicious program |
| US7188369B2 (en) | 2002-10-03 | 2007-03-06 | Trend Micro, Inc. | System and method having an antivirus virtual scanning processor with plug-in functionalities |
| US20040111557A1 (en)* | 2002-12-04 | 2004-06-10 | Yoji Nakatani | Updated data write method using journal log |
| US20040199827A1 (en) | 2003-04-01 | 2004-10-07 | Muttik Igor Garrievich | Malware detection uswing external core characteristics |
| US20070088970A1 (en)* | 2003-04-10 | 2007-04-19 | Lenovo (Singapore) Pte.Ltd | Recovery from failures within data processing systems |
| US7565382B1 (en)* | 2003-08-14 | 2009-07-21 | Symantec Corporation | Safely rolling back a computer image |
| US7664923B2 (en)* | 2003-09-17 | 2010-02-16 | Samsung Electronics Co., Ltd | Method and system for updating software |
| US20050060699A1 (en)* | 2003-09-17 | 2005-03-17 | Samsung Electronics Co., Ltd. | Method and system for updating software |
| US20050060528A1 (en)* | 2003-09-17 | 2005-03-17 | Samsung Electronics Co., Ltd. | Booting and boot code update method and system thereof |
| US7409791B2 (en) | 2003-12-02 | 2008-08-12 | Grip Pod Systems, L.L.C. | Vertical fore grip with bipod |
| US7376970B2 (en) | 2004-02-20 | 2008-05-20 | Microsoft Corporation | System and method for proactive computer virus protection |
| US20050216759A1 (en) | 2004-03-29 | 2005-09-29 | Rothman Michael A | Virus scanning of input/output traffic of a computer system |
| US20060041942A1 (en) | 2004-06-24 | 2006-02-23 | Mcafee, Inc. | System, method and computer program product for preventing spyware/malware from installing a registry |
| US7587760B1 (en)* | 2004-07-26 | 2009-09-08 | Cisco Technology, Inc. | System and methods for preventing denial of service attacks |
| US7181583B2 (en)* | 2004-08-27 | 2007-02-20 | Hitachi, Ltd. | Method and program for creating a snapshot, and storage system |
| US20060047931A1 (en)* | 2004-08-27 | 2006-03-02 | Nobuyuki Saika | Method and program for creating a snapshot, and storage system |
| US20060136771A1 (en)* | 2004-12-06 | 2006-06-22 | Hitachi, Ltd. | Storage system and snapshot data preparation method in storage system |
| US7409719B2 (en)* | 2004-12-21 | 2008-08-05 | Microsoft Corporation | Computer security management, such as in a virtual machine or hardened operating system |
| US20060136720A1 (en)* | 2004-12-21 | 2006-06-22 | Microsoft Corporation | Computer security management, such as in a virtual machine or hardened operating system |
| US20060137010A1 (en)* | 2004-12-21 | 2006-06-22 | Microsoft Corporation | Method and system for a self-healing device |
| US20060173935A1 (en)* | 2005-02-03 | 2006-08-03 | Arif Merchant | Method of restoring data |
| US20060236049A1 (en)* | 2005-04-13 | 2006-10-19 | Hitachi, Ltd. | Remote copy system and remote copy method |
| US20070006304A1 (en)* | 2005-06-30 | 2007-01-04 | Microsoft Corporation | Optimizing malware recovery |
| US7636946B2 (en)* | 2005-08-31 | 2009-12-22 | Microsoft Corporation | Unwanted file modification and transactions |
| US7581136B2 (en)* | 2006-05-19 | 2009-08-25 | Hitachi, Ltd. | Method and apparatus for data recovery |
| Title |
|---|
| Office Action dated Apr. 2, 2009 in U.S. Appl. No. 11/204,567. |
| Office Action dated Jan. 16, 2009 in U.S. Appl. No. 11/247,349. |
| Office Action dated Jun. 15, 2009 in U.S. Appl. No. 11/247,349. |
| Office Action dated Jun. 3, 2009 in U.S. Appl. No. 11/356,600. |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12282549B2 (en) | 2005-06-30 | 2025-04-22 | Open Text Inc. | Methods and apparatus for malware threat research |
| US8661541B2 (en)* | 2005-07-15 | 2014-02-25 | Microsoft Corporation | Detecting user-mode rootkits |
| US20110099632A1 (en)* | 2005-07-15 | 2011-04-28 | Microsoft Corporation | Detecting user-mode rootkits |
| US20080047013A1 (en)* | 2005-08-16 | 2008-02-21 | Emc Corporation | Method and system for detecting malware |
| US8468604B2 (en) | 2005-08-16 | 2013-06-18 | Emc Corporation | Method and system for detecting malware |
| US8255998B2 (en)* | 2005-08-16 | 2012-08-28 | Emc Corporation | Information protection method and system |
| US20080016564A1 (en)* | 2005-08-16 | 2008-01-17 | Emc Corporation | Information protection method and system |
| US20080276299A1 (en)* | 2007-04-02 | 2008-11-06 | Samsung Electronics Co., Ltd. | Wireless terminal apparatus and method of protecting system resources |
| US20090038012A1 (en)* | 2007-08-03 | 2009-02-05 | Lenovo (Beijing) Limited | Method and system for deleting or isolating computer viruses |
| US8365285B2 (en)* | 2007-08-03 | 2013-01-29 | Lenovo (Beijing) Limited | Method and system for deleting or isolating computer viruses |
| US20120143826A1 (en)* | 2007-12-19 | 2012-06-07 | Microsoft Corporation | Creating and utilizing network restore points |
| US8612391B2 (en)* | 2007-12-19 | 2013-12-17 | Microsoft Corporation | Creating and utilizing network restore points |
| US7934262B1 (en)* | 2007-12-26 | 2011-04-26 | Emc (Benelux) B.V., S.A.R.L. | Methods and apparatus for virus detection using journal data |
| US8392539B1 (en)* | 2008-03-19 | 2013-03-05 | Trend Micro, Inc. | Operating system banking and portability |
| US8949187B1 (en)* | 2008-05-30 | 2015-02-03 | Symantec Corporation | Systems and methods for creating and managing backups based on health information |
| US8291261B2 (en)* | 2008-11-05 | 2012-10-16 | Vulcan Technologies Llc | Lightweight application-level runtime state save-and-restore utility |
| US20100115334A1 (en)* | 2008-11-05 | 2010-05-06 | Mark Allen Malleck | Lightweight application-level runtime state save-and-restore utility |
| US8418251B1 (en)* | 2009-04-27 | 2013-04-09 | Symantec Corporation | Detecting malware using cost characteristics |
| US20110197279A1 (en)* | 2009-05-29 | 2011-08-11 | Hitachi, Ltd. | Management methods of storage system and file system |
| US8683576B1 (en)* | 2009-09-30 | 2014-03-25 | Symantec Corporation | Systems and methods for detecting a process to establish a backdoor connection with a computing device |
| US12164466B2 (en) | 2010-03-29 | 2024-12-10 | Open Text Inc. | Log file management |
| US12210479B2 (en) | 2010-03-29 | 2025-01-28 | Open Text Inc. | Log file management |
| US8452735B2 (en)* | 2010-05-26 | 2013-05-28 | International Business Machines Corporation | Selecting a data restore point with an optimal recovery time and recovery point |
| US20110296237A1 (en)* | 2010-05-26 | 2011-12-01 | International Business Machines Corporation | Selecting a data restore point with an optimal recovery time and recovery point |
| US20120322439A1 (en)* | 2010-06-14 | 2012-12-20 | Future Dial Inc. | System and Method for Enhanced Diagnostics on Mobile Communication Devices |
| US9585033B2 (en) | 2010-06-14 | 2017-02-28 | Future Dial, Inc. | System and method for enhanced diagnostics on mobile communication devices |
| US8855627B2 (en)* | 2010-06-14 | 2014-10-07 | Future Dial, Inc. | System and method for enhanced diagnostics on mobile communication devices |
| US8352522B1 (en)* | 2010-09-01 | 2013-01-08 | Trend Micro Incorporated | Detection of file modifications performed by malicious codes |
| US9378369B1 (en)* | 2010-09-01 | 2016-06-28 | Trend Micro Incorporated | Detection of file modifications performed by malicious codes |
| US20120158661A1 (en)* | 2010-12-15 | 2012-06-21 | Microsoft Corporation | Context-specific rollback |
| US20120297488A1 (en)* | 2011-05-16 | 2012-11-22 | Microsoft Corporation | Discovering Malicious Input Files and Performing Automatic and Distributed Remediation |
| US9436826B2 (en)* | 2011-05-16 | 2016-09-06 | Microsoft Technology Licensing, Llc | Discovering malicious input files and performing automatic and distributed remediation |
| US10467080B2 (en) | 2011-08-16 | 2019-11-05 | Future Dial, Inc. | Systems and methods to reprogram mobile devices |
| US11815991B2 (en) | 2011-08-16 | 2023-11-14 | Future Dial, Inc. | Systems and methods to reprogram mobile devices including a cross-matrix controller to port connection |
| US8996916B2 (en) | 2011-08-16 | 2015-03-31 | Future Dial, Inc. | System and method for identifying problems via a monitoring application that repetitively records multiple separate consecutive files listing launched or installed applications |
| US10503579B2 (en) | 2011-08-16 | 2019-12-10 | Future Dial, Inc. | System and method for identifying operational disruptions in mobile computing devices |
| US10572328B2 (en) | 2011-08-16 | 2020-02-25 | Future Dial, Inc. | Systems and methods to reprogram mobile devices |
| US11099923B2 (en) | 2011-08-16 | 2021-08-24 | Future Dial, Inc. | Systems and methods to reprogram mobile devices |
| US11169867B2 (en) | 2011-08-16 | 2021-11-09 | Future Dial, Inc. | System and method for identifying operational disruptions in mobile computing devices via a monitoring application that repetitively records multiple separate consecutive files listing launched or installed applications |
| US12339734B2 (en) | 2011-08-16 | 2025-06-24 | Future Dial, Inc. | Systems and methods to reprogram mobile devices based on identity information queried using a low-functionality driver |
| US11507450B2 (en) | 2011-08-16 | 2022-11-22 | Future Dial, Inc. | Systems and methods to reprogram mobile devices via a cross-matrix controller to port connection |
| US9661490B2 (en) | 2011-08-16 | 2017-05-23 | Future Dial, Inc. | System and method for identifying operational disruptions in mobile computing devices |
| WO2013087603A1 (en)* | 2011-12-14 | 2013-06-20 | F-Secure Corporation | Disinfection of a file system |
| US10701097B2 (en)* | 2011-12-20 | 2020-06-30 | Micro Focus Llc | Application security testing |
| US20130160131A1 (en)* | 2011-12-20 | 2013-06-20 | Matias Madou | Application security testing |
| US20130167235A1 (en)* | 2011-12-22 | 2013-06-27 | Microsoft Corproation | Augmenting system restore with malware detection |
| EP2795525A4 (en)* | 2011-12-22 | 2015-08-12 | Microsoft Technology Licensing Llc | INCREASING SYSTEM RESTORATION BY DETECTING MALWARE SOFTWARE |
| WO2013096140A1 (en) | 2011-12-22 | 2013-06-27 | Microsoft Corporation | Augmenting system restore with malware detection |
| CN103065091B (en)* | 2011-12-22 | 2016-03-09 | 微软技术许可有限责任公司 | Reduce with malware detection expanding system |
| US9613209B2 (en)* | 2011-12-22 | 2017-04-04 | Microsoft Technology Licensing, Llc. | Augmenting system restore with malware detection |
| CN103065091A (en)* | 2011-12-22 | 2013-04-24 | 微软公司 | Extension of system restoration by using malware detection |
| US12131294B2 (en) | 2012-06-21 | 2024-10-29 | Open Text Corporation | Activity stream based interaction |
| US10324843B1 (en) | 2012-06-30 | 2019-06-18 | EMC IP Holding Company LLC | System and method for cache management |
| US9378096B1 (en)* | 2012-06-30 | 2016-06-28 | Emc Corporation | System and method for cache management |
| US20140122859A1 (en)* | 2012-11-01 | 2014-05-01 | International Business Machines Corporation | Configuring configuration settings using a user context |
| US9501648B2 (en)* | 2012-11-01 | 2016-11-22 | International Business Machines Corporation | Configuring configuration settings using a user context |
| US20140122853A1 (en)* | 2012-11-01 | 2014-05-01 | International Business Machines Corporation | Configuring configuration settings using a user context |
| US9928368B2 (en)* | 2012-11-01 | 2018-03-27 | International Business Machines Corporation | Configuring configuration settings using a user context |
| US9754110B2 (en)* | 2012-11-01 | 2017-09-05 | International Business Machines Corporation | Configuring configuration settings using a user context |
| US9773026B1 (en)* | 2012-12-20 | 2017-09-26 | EMC IP Holding Company LLC | Calculation of system utilization |
| EP2972772A4 (en)* | 2013-03-15 | 2016-11-16 | Amazon Tech Inc | INSTANT COPIES IN PLACE |
| US10180951B2 (en) | 2013-03-15 | 2019-01-15 | Amazon Technologies, Inc. | Place snapshots |
| CN105518694A (en)* | 2013-06-25 | 2016-04-20 | 微软技术许可有限责任公司 | Reverse copy to restore damaged files |
| US10204113B2 (en) | 2013-06-25 | 2019-02-12 | Microsoft Technology Licensing, Llc | Reverse replication to rollback corrupted files |
| WO2014209825A1 (en)* | 2013-06-25 | 2014-12-31 | Microsoft Corporation | Reverse replication to rollback corrupted files |
| US9323924B1 (en)* | 2014-05-09 | 2016-04-26 | Symantec Corporation | Systems and methods for establishing reputations of files |
| US12261822B2 (en) | 2014-06-22 | 2025-03-25 | Open Text Inc. | Network threat prediction and blocking |
| US12301539B2 (en) | 2014-06-22 | 2025-05-13 | Open Text Inc. | Network threat prediction and blocking |
| US12412413B2 (en) | 2015-05-08 | 2025-09-09 | Open Text Corporation | Image box filtering for optical character recognition |
| US12437068B2 (en) | 2015-05-12 | 2025-10-07 | Open Text Inc. | Automatic threat detection of executable files based on static data analysis |
| US12197383B2 (en) | 2015-06-30 | 2025-01-14 | Open Text Corporation | Method and system for using dynamic content types |
| US10043026B1 (en)* | 2015-11-09 | 2018-08-07 | 8X8, Inc. | Restricted replication for protection of replicated databases |
| US11120132B1 (en)* | 2015-11-09 | 2021-09-14 | 8X8, Inc. | Restricted replication for protection of replicated databases |
| US11153335B1 (en) | 2015-11-09 | 2021-10-19 | 8X8, Inc. | Delayed replication for protection of replicated databases |
| US10440039B1 (en) | 2015-11-09 | 2019-10-08 | 8X8, Inc. | Delayed replication for protection of replicated databases |
| US10885196B2 (en) | 2016-04-29 | 2021-01-05 | Hewlett Packard Enterprise Development Lp | Executing protected code |
| US10326599B2 (en) | 2016-05-09 | 2019-06-18 | Hewlett Packard Enterprise Development Lp | Recovery agents and recovery plans over networks |
| US20180167403A1 (en)* | 2016-12-12 | 2018-06-14 | Ut Battelle, Llc | Malware analysis and recovery |
| US10931685B2 (en)* | 2016-12-12 | 2021-02-23 | Ut-Battelle, Llc | Malware analysis and recovery |
| US11275834B1 (en)* | 2017-01-12 | 2022-03-15 | Richard Offer | System for analyzing backups for threats and irregularities |
| US9734337B1 (en)* | 2017-01-24 | 2017-08-15 | Malwarebytes Inc. | Behavior-based ransomware detection |
| US10032025B1 (en) | 2017-01-24 | 2018-07-24 | Malwarebytes Inc. | Behavior-based ransomware detection |
| US11010470B2 (en)* | 2017-12-15 | 2021-05-18 | Microsoft Technology Licensing, Llc | Anti-virus file system cache for operating system remediation |
| US12149623B2 (en) | 2018-02-23 | 2024-11-19 | Open Text Inc. | Security privilege escalation exploit detection and mitigation |
| US10963564B2 (en) | 2018-03-30 | 2021-03-30 | Microsoft Technology Licensing, Llc | Selection of restore point based on detection of malware attack |
| US10917416B2 (en)* | 2018-03-30 | 2021-02-09 | Microsoft Technology Licensing, Llc | Service identification of ransomware impacted files |
| US20190306179A1 (en)* | 2018-03-30 | 2019-10-03 | Microsoft Technology Licensing, Llc | Service identification of ransomware impacted files |
| WO2019190936A1 (en)* | 2018-03-30 | 2019-10-03 | Microsoft Technology Licensing, Llc | Selection of restore point based on detection of malware attack |
| US11308207B2 (en) | 2018-03-30 | 2022-04-19 | Microsoft Technology Licensing, Llc | User verification of malware impacted files |
| US10769278B2 (en) | 2018-03-30 | 2020-09-08 | Microsoft Technology Licensing, Llc | Service identification of ransomware impact at account level |
| US10896085B2 (en) | 2018-05-08 | 2021-01-19 | Hewlett-Packard Development Company, L.P. | Mitigating actions |
| US11809559B2 (en) | 2018-08-03 | 2023-11-07 | Hewlett-Packard Development Company, L.P. | Intrusion resilient applications |
| US12235960B2 (en) | 2019-03-27 | 2025-02-25 | Open Text Inc. | Behavioral threat detection definition and compilation |
| US11153373B2 (en) | 2019-05-03 | 2021-10-19 | EMC IP Holding Company LLC | Method and system for performance-driven load shifting |
| US11720470B2 (en)* | 2020-08-19 | 2023-08-08 | Unitedhealth Group Incorporated | Dynamic post-change computing-system evaluation |
| US20220058103A1 (en)* | 2020-08-19 | 2022-02-24 | Unitedhealth Group Incorporated | Dynamic post-change computing-system evaluation |
| CN114116322B (en)* | 2022-01-27 | 2022-05-24 | 深圳市科力锐科技有限公司 | Data recovery method, device, equipment and storage medium |
| CN114116322A (en)* | 2022-01-27 | 2022-03-01 | 深圳市科力锐科技有限公司 | Data recovery method, device, equipment and storage medium |
| US20230388340A1 (en)* | 2022-05-31 | 2023-11-30 | WithSecure Corporation | Arrangement and method of threat detection in a computer or computer network |
| Publication | Publication Date | Title |
|---|---|---|
| US7784098B1 (en) | Snapshot and restore technique for computer system recovery | |
| Kharraz et al. | Redemption: Real-time protection against ransomware at end-hosts | |
| US7779472B1 (en) | Application behavior based malware detection | |
| US9317686B1 (en) | File backup to combat ransomware | |
| US10291634B2 (en) | System and method for determining summary events of an attack | |
| US8381298B2 (en) | Malware detention for suspected malware | |
| US8171552B1 (en) | Simultaneous execution of multiple anti-virus programs | |
| US7934261B1 (en) | On-demand cleanup system | |
| US11232201B2 (en) | Cloud based just in time memory analysis for malware detection | |
| US8590045B2 (en) | Malware detection by application monitoring | |
| US7607171B1 (en) | Virus detection by executing e-mail code in a virtual machine | |
| US7716743B2 (en) | Privacy friendly malware quarantines | |
| US8195953B1 (en) | Computer program with built-in malware protection | |
| US7840958B1 (en) | Preventing spyware installation | |
| US7729690B1 (en) | Backup and restore of user data for mobile telephone | |
| US20110047618A1 (en) | Method, System, and Computer Program Product for Malware Detection, Analysis, and Response | |
| US20080301051A1 (en) | Internet fraud prevention | |
| US12001555B1 (en) | System, method, and apparatus for preventing ransomware | |
| US8918874B2 (en) | Malware scanning | |
| WO2007035575A2 (en) | Method and apparatus for removing harmful software | |
| US20190095285A1 (en) | Backup and recovery of data files using hard links | |
| US11113391B2 (en) | Method and computer system for preventing malicious software from attacking files of the computer system and corresponding non-transitory computer readable storage medium | |
| Alzahrani et al. | Ransomware in windows and android platforms | |
| Strunk et al. | Intrusion detection, diagnosis, and recovery with self-securing storage | |
| CN116204880A (en) | Computer virus defense system |
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment | Owner name:TREND MICRO, INC., JAPAN Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FAN, PAUL;LIN, JASON;WANG, PUMBAA;REEL/FRAME:016646/0913 Effective date:20050818 | |
| STCF | Information on status: patent grant | Free format text:PATENTED CASE | |
| FPAY | Fee payment | Year of fee payment:4 | |
| MAFP | Maintenance fee payment | Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552) Year of fee payment:8 | |
| MAFP | Maintenance fee payment | Free format text:PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment:12 | |
| AS | Assignment | Owner name:TREND MICRO INCORPORATED, TEXAS Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TREND MICRO INCORPORATED;REEL/FRAME:061686/0342 Effective date:20221010 |